Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ACP-Sec1 Alibaba Cloud ACP Cloud Security Professional Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Alibaba Cloud ACP-Sec1 ACP Cloud Security Professional certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 80 questions

You have helped a customer set up a content filtering solution based on Content Moderation service However, the customer is complaining that certain images are getting incorrectly flagged as pornographic content. What can you do to help fix this?

A.

Create an "Image Library" from the Content Moderation console and add the images to the Image Library's whitelist

B.

Ask your customer to use different images on their site

C.

Modify the images until Content Moderation service starts marking them as pornographic.

D.

Open a ticket with Alibaba Cloud support, and send them a copy of the images, so that they can tune Content Moderation's detection algorithms

A large Internet company has services running on physical machines, as well as self-built monitoring and alert system Recently, the company wants to migrate part of the services to Alibaba Cloud and use CloudMonitor to monitor ECS instances and set alerts

What should the company do to quickly interconnect CloudMonitor alerts with the self-built alert system, and handle both alerts (alerts about the physical machines and ECS instances) in self-built alert system?

A.

Use the Event Monitoring function provided by CloudMonitor to consume alerts sent from self-built alert system

B.

Call the API for querying data provided by CloudMonitor. regularly query data, and write a code to check whether indicators are abnormal

C.

Call the API for obtaining messages and alerts that are sent to self-build alert system

D.

This cannot be implemented.

Alibaba Cloud ECS instances are common targets of hacker attacks. There are many types of attacks against ECS instances. Which of the following attacks specifically target the operating system of an ECS instance? (Number of correct answers: 3)

A.

SQL injection

B.

Trojan or Webshell installation

C.

Brute force RDP password cracking

D.

Brute force SSH password cracking

Before using the HTTPS protection feature in Alibaba Cloud WAF, you must upload the server certificate and private key beforehand.

A.

True

B.

False

You want to buy an SSL certificate using Alibaba Cloud's SSL Certificates Service and deploy it in front of an Alibaba Cloud resource (such as Elastic Compute Service) What is the coned sequence of steps to follow?

A.

1 Select a certificate

2. Deploy the certificate in front of your Alibaba Cloud resources

3. Enter request information and submit for review

4. Manage the certificate

B.

1 Select a certificate

2 Enter request information and submit for review

3 Manage the certificate

4 Deploy the certificate in front of your Alibaba Cloud resources

C.

1 Select a certificate

2 Enter request information and submit for review

3. Deploy the certificate in front of your Alibaba Cloud resources

4. Manage the certificate

D.

1 Enter request information and submit for review 2. Select a certificate

3 Deploy the certificate in front of your Alibaba Cloud resources

4 Manage the certificate

If a user has multiple ECS instances on Alibaba Cloud but has no professional O&M team or is unwilling to put efforts in O&M, the user can activate Alibaba Cloud Security Center which provides security expert services like manual security checking, Trojan removing and hosted service monitoring.

A.

True

B.

False

Content Moderation service is useful m a wide variety of scenarios. Which of the following are the *most* suited to Content Moderation's capabilities? (Number of correct answers 2)

A.

Deleting porn on a social networking site

B.

Detecting spam posts on a forum

C.

Detecting faces in images

D.

Detecting sensitive customer information such as credit card numbers in uploaded images

Alibaba Cloud Security's Data R.sk Control can effectively resolve junk registration, database hacking, and other service risk identification problems To use this service. you need to first collect service data. Which of the following methods can be used to collect information off Web application

systems?

A.

JavaScript

B.

SDK

C.

JavaScript, SDK

D.

HTML5

Alibaba Cloud Anti-DDoS Premium Service can be used to protect against DDoS attacks larger than 100 Gbps. It can be used to protect both Alibaba Cloud hosts and non-Alibaba Cloud hosts

A.

True

B.

False

Data Risk Control feature has been integrated into Alibaba Cloud WAF. When this function is activated, a script must be embedded into the page that wishes to be protected under the corresponding domain name to check whether a client is trustworthy. Which type of script is it?

A.

JavaScript

B.

C++

C.

Vbscript

D.

Java

What are some of the products that support integration with Alibaba Cloud's SSL Certificates Service (Number of correct answers: 3)

A.

ApsaraDB for RDS

B.

Content Distribution Network (CDN)

C.

Secure Content Distribution Network (SCDN)

D.

Server Load Balancer (SLB)

Alibaba Cloud CloudMonitor is a service that monitors Alibaba Cloud resources and Internet applications. Which of the following statements about CloudMonitor is accurate'?

A.

CloudMonitor cannot be used through the Alibaba Cloud console

B.

CloudMonitor must be independently bought and paid for activation

C.

CloudMonitor can monitor websites that are not deployed in Alibaba Cloud products.

D.

To use CloudMonitor for ECS monitoring, there no agent needs to be installed in ECS.

Data transfer between Internet devices requires specific specifications, which are called "protocols" Among those, the invention of a certain protocol played a decisive role in the creation of the Internet. By using those protocols, tens of thousands of computers can be connected and communicate with each other What is the following protocol is not defined in OSI 7 layer model?

A.

HTTP

B.

TCP

C.

UDP

D.

SOAP

For which of the following protection scenarios is Alibaba Cloud WAF applicable? (Number of correct answers: 5)

A.

Data leakage prevention

B.

Defense against website trojans and tampering

C.

Virtual vulnerability patches

D.

Protection against malicious CC attacks

E.

Brute force cracking protection

F.

Protection against SMS refresh and service data crawling

An Alibaba Cloud user buys an ECS instance and deploys Tomcat on it Which of the following is the easiest way for the user to monitor whether port 8080 (used by Tomcat) on this ECS instance is functioning normally or not?

A.

Log on to the ECS instance every hour to check the port using the command line.

B.

Buy a third-party monitoring tool

C.

Write a script for detection and report the data to CloudMonitor.

D.

Use Alibaba Cloud CloudMonitor s site monitor feature to create a new Monitoring Task to monitor the port status.

You have bought an ECS instance on Alibaba Cloud After deploying a Python environment on it, which of the following is the easiest and quickest way to monitor whether the Python process is running normally and report an alert if the process is accidentally terminated?

A.

Use site monitoring

B.

Log on to the ECS instance console

C.

Utilize process monitoring feature (can be found in ECS instance

D.

Write a script for monitoring by yourself.

You have set an alert policy for the disk usage of an ECS instance by using Alibaba Cloud CloudMonitor Each measurement cycle lasts for 5 minutes, during which the average disk usage is measured If the average disk usage exceeds 80% for five consecutive measurement cycles, an alert will be reported After your average disk usage exceeds 80%, how long will it take to receive an alert with the best case scenario?

A.

30 minutes

B.

0 minutes

C.

40 minutes

D.

20 minutes

Alibaba Cloud Security Center can record source IP addresses that remotely access a server, and shield suspicious IP addresses that frequently connect to the server. During routine O&M. which of the following functions can be used to set the IP address that are commonly used by the system administrator'?

A.

Security group

B.

Valid Login IP list

C.

Frequent logon location management

D.

Webshell detection

Alibaba Cloud WAF currently supports web security protection for HTTP and HTTPS. Which of the following ports are usually used for HTTP and HTTPS protocols? (Number of correct answers: 2)

A.

80

B.

443

C.

22

D.

21

In a public cloud environment Alibaba Cloud is responsible for security of cloud computing infrastructure (such as the IDC environment, physical server O&M, and virtualization layer of cloud products). However, you still need to perform necessary security optimization measures for the Cloud products you purchased Which of the following actions do you think are safe?

A.

To reduce the communication cost, five administrators of the company use the root account to log on to the ECS instance.

B.

After buying an ECS instance, enable the security group firewall for the ECS instance through the console, and only allow a management IP address to remotely log on to the ECS instance.

C.

For easy management, change the administrator password for the ECS instance to 123456.

D.

To enable colleagues working at home to update data, open public IP addresses for ApsaraDB for RDS instances, and allow all IP addresses to connect to the instances

Page: 1 / 2
Total 80 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved